Categories: Cyber Security News

Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10

A sophisticated threat actor known as Curly COMrades has deployed an innovative attack methodology that leverages legitimate Windows virtualization features to establish covert, long-term access to victim networks.

The campaign, which began in early July 2025, represents a significant evolution in adversary tactics as threat actors increasingly seek methods to bypass endpoint detection and response solutions that have become standard defensive tools.

The operation centers on the abuse of Hyper-V virtualization technology on compromised Windows 10 machines.

By enabling the Hyper-V role and deploying a minimalistic Alpine Linux-based virtual machine, the attackers created a hidden operational environment that hosts custom malware while evading traditional host-based security monitoring.

The virtual machine, requiring only 120MB of disk space and 256MB of memory, provides a dedicated platform for running two custom implants: CurlyShell, a persistent reverse shell, and CurlCat, a reverse proxy tool.

Bitdefender researchers identified this advanced campaign through collaboration with the Georgian CERT, which detected a malicious sample communicating with a compromised site under monitoring.

The joint investigation revealed that Curly COMrades, first documented in August 2025 as a threat actor supporting Russian interests in geopolitical hotbeds, has significantly enhanced its toolkit and operational sophistication.

The forensic analysis uncovered that attackers effectively isolated their malware execution environment within a virtual machine, bypassing many traditional security detections by routing malicious traffic through the host’s network stack, making it appear to originate from legitimate IP addresses.

The attack demonstrates meticulous operational planning and technical expertise. Threat actors established persistence through multiple mechanisms, including PowerShell scripts configured via Group Policy for local account creation and Kerberos ticket manipulation for lateral movement.

Attack flow (Source – Bitdefender)

The deployment of various proxy and tunneling tools such as Resocks, Rsockstun, Ligolo-ng, CCProxy, and Stunnel further illustrates the group’s determination to maintain flexible access channels to compromised environments.

Virtual Machine Deployment and Persistence Mechanism

The deployment sequence begins with enabling the Hyper-V virtualization feature while deliberately disabling its management interface to reduce visibility. The attackers executed the following commands remotely:

dism /online /disable-feature /FeatureName:microsoft-hyper-v-Management-clients /norestart
dism /online /enable-feature /All /LimitAccess /FeatureName:microsoft-hyper-v /norestart

Following a brief interval, the threat actors initiated the payload delivery phase. A RAR archive disguised as a video file was downloaded and extracted to the deceptive directory `c:programdatamicrosoftAppVapp`, a location designed to blend with legitimate Microsoft application virtualization files. The virtual machine files were then imported using PowerShell:

powershell.exe -c import-vm -path "c:\programdata\microsoft\AppV\app\Virtual Machines\1DBCC80B-5803-4AF1-8772-712C688F408A.vmcx" -Copy -GenerateNewId
powershell.exe -c Start-VM -name WSL

The VM naming convention “WSL” serves as a deception tactic, suggesting the use of Windows Subsystem for Linux, a commonly trusted developer tool that typically receives less security scrutiny. However, this is a fully isolated Hyper-V instance operating outside the standard WSL framework.

Persistence within the virtual machine operates through a root-level crontab entry that executes every four hours at 20 minutes past the hour.

The cron task runs `/bin/alpine_init`, which subsequently launches the CurlyShell implant located at `/bin/init_tools`.

This custom reverse shell maintains HTTPS communication with the command and control infrastructure, while CurlCat manages SSH reverse proxy tunneling on demand.

The VM configuration utilizes Hyper-V’s Default Switch network adaptor with Network Address Translation, ensuring all malicious outbound traffic appears to originate from the compromised host machine’s legitimate IP address, significantly complicating attribution and detection efforts.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

The post Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10 appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Justice for the Quakertown 5 Movement Continues to Demand Transparency and Police Accountability

Concerns over allegations of excessive police force on February 20 when a Quakertown high school…

10 minutes ago

Student-directed play showcased in youth mental health event

Less than an hour before showtime, eight Concord High School girls helped put tiny braids…

30 minutes ago

Report gives snapshot of food access challenges, insecurity in Kearsarge region

The rural character of the Kearsarge region defines almost every dimension of food access for…

30 minutes ago

More bears means new rules in Pemi Wilderness

If you’re planning an overnight trip to the Pemigewasset Wilderness, add one thing to your…

30 minutes ago

Alien: Isolation 2 Seemingly Teased in New Video Posted by Sega and Creative Assembly

Publisher Sega and developer Creative Assembly have revealed what appears to be a teaser trailer…

3 hours ago

Trump Uses Shooting Outside White House Correspondents’ Dinner to Boost Corrupt Ballroom Project

US President Donald Trump used a lone gunman’s storming of the lobby outside the White House Correspondents’ Dinner on…

3 hours ago

This website uses cookies.